Search
Close this search box.

“We are committed to providing the best and most comprehensive IBM i compliance, auditing and security solutions.”

Shmuel Zailer

iSecurity Suite by Raz-Lee

Raz-Lee Security is recognized as an industry leader in IBM i security and productivity tools. Our iSecurity suite includes over 20 individual products, securing companies’ IBM i servers, as well as their business-critical databases.

Advanced Threat Protection

The iSecurity suite of products helps companies meet their IBM i security and regulatory requirements by providing best-in-class Exit Point Monitoring Integration, Anti-Virus protection of the IFS for malware as well as command line access security.

Anti-Ransomware

Detects and isolates the threat, and prevents it from damaging valuable data.

Antivirus

IFS virus checks and scans, Native Object Integrity checks, alert by email and by Syslog.

Antivirus ICAP Client

Gives to you the power to choose the Antivirus Database Provider.

Auditing & Response

iSecurity Auditing and Response products help companies meet their IBM i auditing requirements by providing best-in-class monitoring and reporting solutions that secure their business-critical databases.

It supports capabilities such as user monitoring and control, sophisticated reporting and application data tracking – thereby streamlining server security audits.

Action

Real-time security events, via triggers to Email, SMS, Syslog, SNMP, and CL commands.

Audit

Real-time monitoring for QAUDJRN, User Activity and more. Schedule Reports and Security status.

Capture

Silent 5250 screen capture for end-to-end audit trails with Playback.

Change Tracker

Changes to production automatically logged in IFS at object / source levels.

Compliance Manager

User Profiles, Native Objects and IFS. Plan, Check and Set parameters and authorities.

Authentication & Authorization

Each module in our comprehensive security solutions for IBM i is designed to work independently or collectively to secure remote access, control user authorities and secure objects.

Multi Factor Authentication
Native Multi Factor Authentication ensuring Secure Sign On for IBM i.
Password Reset
Self-Assisted password support, Native, in a simple way and Web-based.
Authority On Demand
Provides temporary extended authorization by Swap or by Adding authority.

Encryption

Secure Data in Rest and Data in Transit with our Encryption solutions for IBM i. Enable the maximum security for your most valuable assets and comply with all the Security Policies thanks to our encryption solutions.
Field Encryption
Column-level field encryption based on IBM’s FIELDPROC, Encryption & Tokenization.
PGP Encryption
Private and Public key technology for encrypting data files end-to-end.

Protection

Effective Protection against any situation that could compromise security and reliability for IBM i.

Native Firewall Solution to control every Exit Point, besides control for Commands and Updating Files in Software Development Environments.

Safe Update

Regulates update files in production libraries. It provides a new security layer.

Command

Control validity of System and User commands and their parameters, per user, IP, time, etc.

Firewall

Network security, controlling Exit Points, Open DB’s and SSH. Rule Wizards and graphical BI.

Evaluation, Reporting & Alerts

Raz-Lee has developed several evaluation, reporting and alert solutions for assessing security risks, analyzing data and presenting actionable information to help executives, managers and other corporate end users make informed business decisions.
Assessment

Analyzes and scores IBM i security definitions, suggests corrections and solutions.

Authority Inspector

Works with IBM’s Authority Collection data. It reads, summarizes and analyzes users.

Compliance Evaluator

Single view for Network-wide PCI, site-defined compliance checks for multiple LPARS.

SIEM & DAM Support

Easy to define and integrate with IBM QRadar, Tivoli, RSA, ArcSight, and more.

Visualizer

Intuitive Graphical BI analysis of security data, supports “drill” to specific events.

Database Solutions

iSecurity Database Solutions provide application security products that preserve the integrity of business-critical information and productivity tools with which you can securely access and edit data for the IBM i.
AP-Journal

Real-time DB activity including READ. Compares values by fields, Alerts and Reports.

DB-Gate

Standard Native access to Oracle, MSSQL/MySQL, from STRSQL, RPG, COBOL.

FileScope

SOX enabled File editor with UNDO capability and Log record of Changes.

Compliance Solutions

Raz-Lee’s iSecurity solutions assist IBM i companies in attaining maximum compliance with PCI, SOX, GDPR and HIPAA regulations. By providing ready-made tools tailored to meet their requirements, iSecurity enables companies to effortlessly achieve data safety and compliance.

PCI-DSS

Any organization that stores, processes or transmits cardholder data is required to comply with the PCI DSS standard.

SOX

Legislative audit requirements to protect investors by improving the accuracy and reliability of corporate disclosures

GDPR

The General Data Protection Regulation reinforces and binds together information security for all people inside the European Union (EU).

HIPAA

A group of regulations that combat waste, fraud, and abuse in health care delivery and health insurance.

Why Raz-Lee

Software House

Our Development Team is always improving our produts.

Integrated Solutions

iSecurity Suite is Native to IBM i so no additional structure is needed.

SIEM & DAM Support

Partnerships with major global SIEM & DAM solution providers.

Flexibility

Users can choose to work on Green Screen or GUI (Windows).

iSecurity Assessment

Windows-based program for in-depth analysis of the full scope of the IBM i (AS/400) security strengths and weaknesses, pinpointing the security risks which should be addressed. The output is a detailed report, grading each facet of IBM i security, with full explanations.

In the Spotlight

Read our articles about IBM i Compliance and IT Security.

Zero Trust

What Is Zero Trust

Zero Trust has become one of cybersecurity’s most used buzzwords. “never trust, always verify” Zero Trust was created based on

Ransomware 2023 Summary Report

Ransomware attacks increased by over 37% in 2023 compared to the previous year, with the average enterprise ransom payment exceeding

Join Our Newsletter

Receive our latest blog posts directly in your inbox!